Threats and risks

US ambassador: 'We must stop Chinese cyber crime'

China map
Max Baucus, the United States ambassador to China, says action must be taken to prevent cyber crime originating from the country
25 Jun 2014

Heartbleed - 300,000 systems still not secure

heartbleed
Even a decade from now, critical systems could be vulnerable, claims security researcher
23 Jun 2014

US Congress to cut finance for NSA ‘backdoor snooping’

us-congress-building
Representatives assert themselves to bar government agencies from demanding 'back door' access to IT platforms
20 Jun 2014

Amazon launches smartphone with 3D gimmickry and retail sales leanings

That’s all very well… but is it innovation?
19 Jun 2014

GCHQ can now legally track Google, Facebook and web-based email without warrants

Welcome to your connected future, citizen
18 Jun 2014

80 per cent of data centres still using physical security to protect virtualised estate

And only a fifth of those are taking steps to phase it out
18 Jun 2014

If you can’t get business done, tight data centre security is worthless, warns Trend Micro

Think about the application of technology as well as the capability, says VP of cloud
17 Jun 2014

Tweetdeck 'hack': rudimentary, but still widely shared

The XSS vulnerability in Tweetdeck showed just how easily scripts can be run on user devices from a simple security flaw.
12 Jun 2014

Security industry advice for battling Turing Test-beating AIs: 'Be nice and sceptical'

Symantec and Juniper admit there is not yet a clear plan for beating more advanced forms of 'Eugene Goostman'
11 Jun 2014

Google must prevent illegal access to our content, says News Corp

Phone-hacking media giant unhappy about with Google search algorithms that let downloaders 'steal' its TV shows
09 Jun 2014

Call for more specialist code reviewers after new OpenSSL vulnerability found

University of Ulster's Kevin Curran tells Computing that code reviewers need to think like hackers
06 Jun 2014

European governments targeted by 'Molerats' cyber-crime gang

BBC and a major financial institution also attacked with 'spear phishing' emails
03 Jun 2014

National Crime Agency issues warning over GOZeuS and CryptoLocker malware

P2P network that controls banking Trojan taken down in action led by FBI
03 Jun 2014

Flaws in 999-emergency calling system software exposes sensitive calls to hackers

Multiple flaws in NICE Systems software and MySQL database could be exploited by hackers, warns security company
31 May 2014

NHS cyber security 'suffers from lack of data ownership'

Coventry University's Dr Siraj Ahmed Shaikh responds to report Criticising cyber security in healthcare
30 May 2014

Security experts' surprise over report claiming healthcare 'lags behind' in cyber security

Mimecast and Trustwave question claims made in report by risk start-up BitSight
29 May 2014

Panda: Trojans account for three-quarters of all malware

Anti-virus software vendor claims there's more malware than ever being made – and they all want to take control of users' PCs
29 May 2014

Shoe retail chain Office latest victim of security breach

CEO Brian McCluskey urges customers to change their passwords for Office as well as other accounts
29 May 2014

Outlook Android app's security called into question by researchers

Messages and attachments are not as well protected as Microsoft would have users believe, says Include Security
27 May 2014

GCHQ targeted input components in Guardian newspaper raid

Security services ripped out controller chips from keyboard and trackpad – as well as taking hard-disk drives
23 May 2014

EBay reveals it was hacked in February 2014, personal data compromised

"Change your passwords," urges company, three months too late
21 May 2014

US utility control systems hacked, claims Department of Homeland Security

Hackers accessed utility control systems via internet portal protected only by 'simple' passwords
21 May 2014

Businesses risk data breaches due to 'confusion' over privileged users

Raytheon report suggests organisations recognise threats posed by staff with access to sensitive information, but aren’t sure how to stop 'curiosity' leading to a potential data breach
20 May 2014

Cisco to President Obama: Stop compromising our gear

Cisco to President Obama: Stop tampering with our gear
19 May 2014